Information security management

Results: 13712



#Item
41Security / Human rights / Prevention / Identity management / Crime prevention / National security / Secure communication / Internet privacy / Mus / Privacy / Computer security

MONTANA BOARD OF REGENTS OF HIGHER EDUCATION Policy and Procedures Manual SUBJECT: INFORMATION TECHNOLOGY PolicyPrivacy, Security, and Monitoring Approved: May 24, 2002; Revised: May 25, 2012

Add to Reading List

Source URL: mus.edu

Language: English - Date: 2012-05-29 12:54:58
42Cryptography / E-commerce / Stock market / Key management / Public key infrastructure / Public-key cryptography / Password / Electronic trading / Certificate authority / Futures exchange / Security / Computer security

Guide to ensure information and communications security In the information society and globalized world of today, people are becoming more and more connected to their computers and the Internet. As a result, electronic t

Add to Reading List

Source URL: www.taifex.com.tw

Language: English - Date: 2012-04-19 04:47:00
43Computer access control / Computer security / Access control / Password / Security / Login / Identity management systems / Password strength / Password fatigue

Greetings, Your information for logging into classes will be issued to you in steps. As you are enrolled in our new Genius system, you will be issued a confirmation with your user name and password. It is essential that

Add to Reading List

Source URL: www.jedivirtual.org

Language: English - Date: 2016-05-16 13:44:09
44Prevention / Safety / Security / Computer security / Data security / Auditing / National security / Information security / Internal control / Risk management / Audit / Resilience

ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES THIS POLICY SETS OUT THE REQUIREMENTS FOR SAFEGUARDING COMPANY ASSETS AND RESOURCES

Add to Reading List

Source URL: www.astrazeneca.com

Language: English - Date: 2016-01-07 10:04:53
45Fisheries law / Natural resources / Fishing / Fisheries science / Biology / Fishing industry / Personally identifiable information / Privacy / Endangered Species Act / MagnusonStevens Fishery Conservation and Management Act / Privacy Office of the U.S. Department of Homeland Security / Fisheries management

Version Number: U.S. Department of Commerce NOAA NMFS Privacy Impact Assessment

Add to Reading List

Source URL: cio.noaa.gov

Language: English - Date: 2016-07-26 15:07:51
46Internet privacy / Cryptography / Privacy / Computing / Computer security / Identity management / Facebook / HTTP cookie / Personally identifiable information / Web analytics / Information privacy / Medical privacy

Privacy Policy 1. General. We have copyright over this Privacy Policy. Use by third parties, even by way of extract, for any purposes is not allowed. Infringements may be subject to legal actionWe value the trust

Add to Reading List

Source URL: www.olamoney.com

Language: English - Date: 2016-08-18 05:51:20
47Journal of Contingencies and Crisis Management / Risk / Security / Strategic management / Emergency medicine / Politics / Health / Policy studies / Information Quality

SUBSECRETARÍA DE SALUD PÚBLICA DIVISIÓN PLANIFICACION SANITARIA BIBLIOTECA DE SALUD “DR. BOGOSLAV JURICIC T.” ALERTA BIBLIOGRÁFICA REVISTAS DE EMERGENCIAS Y DESASTRES EN SALUD

Add to Reading List

Source URL: www.bibliotecaminsal.cl

Language: English - Date: 2015-09-11 13:47:14
48Systems engineering / Military acquisition / Economy / Business / Government / Project management / Supply chain management / Government procurement in the United States / United States administrative law / Information Services Procurement Library / Analysis of Alternatives / United States Department of Homeland Security

Investment Management Handbook

Add to Reading List

Source URL: www.it-aac.org

Language: English - Date: 2015-06-22 12:07:28
49Computer security / Computing / Information technology management / Information technology / Data security / ISO/IEC 27000-series / ISO/IEC 20000 / ISO/IEC 27001:2013 / Security controls

Neue ISO 27004: Kennzahlen für Security

Add to Reading List

Source URL: sk.cis-cert.com

Language: English - Date: 2010-09-02 08:03:06
50Information technology management / Corporate Governance of ICT / Evaluation / Draft:ICT Security Policy System: A Case Study / Information and communication technologies for development

Organizational Unit National ICT Governance (NIG) - Program Monitoring, Evaluation and Statistical Coordination Division (PMESC) Functions of the Division Develop and apply strategic monitoring and evaluation tools in t

Add to Reading List

Source URL: dict.gov.ph

Language: English - Date: 2014-12-01 02:05:54
UPDATE